Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-27CheckpointAlex Ilgayev
An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack Methods
QakBot
2020-08-26CISACISA, FBI, U.S. Cyber Command, U.S. Department of the Treasury
Alert (AA20-239A): FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks
FastCash
2020-08-26CISACISA
MAR-10301706-1.v1 - North Korean Remote Access Tool: ECCENTRICBANDWAGON
PSLogger
2020-08-26CISACISA
MAR-10301706-2.v1 - North Korean Remote Access Tool: VIVACIOUSGIFT
NACHOCHEESE
2020-08-26Lab52Jagaimo Kawaii
A twisted malware infection chain
Agent Tesla Loki Password Stealer (PWS)
2020-08-26Max Kersten's BlogMax Kersten
ReZer0v4 loader
MASS Logger
2020-08-26Kaspersky LabsGiampaolo Dedola
Transparent Tribe: Evolution analysis, part 2
AhMyth Crimson RAT Oblique RAT
2020-08-25Aqua NautilusAssaf Morag
Deep Analysis of TeamTNT Techniques Using Container Images to Attack
TeamTNT Tsunami XMRIG
2020-08-25KELAVictoria Kivilevich
How Ransomware Gangs Find New Monetization Schemes and Evolve in Marketing
Avaddon Clop DarkSide DoppelPaymer Mailto Maze MedusaLocker Mespinoza Nefilim RagnarLocker REvil Sekhmet
2020-08-25BleepingComputerLawrence Abrams
Ryuk successor Conti Ransomware releases data leak site
Conti
2020-08-25360 Threat Intelligence Center360 Threat Intelligence Center
Darkhotel (APT-C-06) organized multiple attacks using the Thinmon backdoor framework to reveal the secrets
ThinMon
2020-08-24KELAVictoria Kivilevich
Torum is Dead. Long Live CryptBB?
2020-08-24Kaspersky LabsIvan Kwiatkowski, Maher Yamout, Pierre Delcher
Lifting the veil on DeathStalker, a mercenary triumvirate
EVILNUM Janicab Evilnum
2020-08-24Group-IBOleg Skulkin
Cybercriminal greeners from Iran attack companies worldwide for financial gain
Dharma
2020-08-23FBIFBI
AC-000129-TT: Chinese Government-Mandated Tax Software Contains Malware, Enabling Backdoor Access
GoldenSpy
2020-08-23Github (Insane-Forensics)Insane-Forensics
Dispatches from Drovorub: Network Threat Hunting for Russia GRU GTsSS' Malware at Scale
2020-08-22KrabsOnSecurityMr. Krabs
BitRAT – The Latest in Copy-pasted Malware by Incompetent Developers
BitRAT
2020-08-21RiskIQSteve Ginty
Pinchy Spider: Ransomware Infrastructure Connected to Dark Web Marketplace
REvil
2020-08-21BundeskriminalamtBundeskriminalamt
Mögliche Cyberspionage mittels der Schadsoftware GOLDENSPY
GoldenSpy
2020-08-21Palo Alto Networks Unit 42Brad Duncan
Wireshark Tutorial: Decrypting HTTPS Traffic
Dridex